Wednesday, January 22, 2025
HomeCVE/vulnerabilityMicrosoft Urges Windows Admins to Patch Microsoft Message Queuing RCE Flaw

Microsoft Urges Windows Admins to Patch Microsoft Message Queuing RCE Flaw

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has disclosed two Critical remote code execution vulnerabilities in MSMQ (Microsoft Message Queuing) and the Windows Wi-Fi Driver.

The CVE for these vulnerabilities has been assigned with CVE-2024-30080 and CVE-2024-30078. 

The severity for these vulnerabilities was given as 9.8 (Critical) and 8.8 (High), respectively.

However, Microsoft has released patches and security advisories to address these vulnerabilities.

Both of these vulnerabilities were credited to Cyber Kunlun.

With ANYRUN You can Analyze any URL, Files & Email for Malicious Activity : Start your Analysis

CVE-2024-30080: Microsoft Message Queuing (MSMQ) RCE

This vulnerability exists due to a Use-After-Free condition in Microsoft Message Queuing that could allow an authenticated threat actor to execute remote code on a vulnerable system. 

However, to exploit this vulnerability, the threat actor must send a specially crafted malicious MSMQ packet to an MSMQ server, which will execute remote code on the server.

This vulnerability existed in multiple Windows Server and Windows OS versions, including Windows Server 2008, 2012, 2016, 2022, Windows 10 22H2, 21H2, and Windows 11 21H2, 22H2, and 23H2. Microsoft has categorized this vulnerability as (Critical).

CVE-2024-30078: Windows Wi-Fi Driver RCE

This vulnerability exists due to improper input validation, which could allow an unauthenticated threat actor to send malicious networking packets to an adjacent system consisting of a Wi-Fi networking adapter, resulting in remote code execution on the system.

However, to exploit this vulnerability, a threat actor must be within the target system’s range to send and receive radio transmissions.

This vulnerability also existed in multiple Windows products, including Windows Server 2019, 2022, 2008, and 2012, and Windows 10 22H2, 21H2, and Windows 11 21H2, 22H2, and 23H2.

Users of these products should upgrade their Windows to the latest versions to prevent threat actors from exploiting these vulnerabilities.

Looking for Full Data Breach Protection? Try Cynet's All-in-One Cybersecurity Platform for MSPs: Try Free Demo 

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...

Gootloader Malware Employs Blackhat SEO Techniques To Attack Victims

The Gootloader malware family employs sophisticated social engineering tactics to infiltrate computers.By leveraging...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

PoC Exploit Released for TP-Link Code Execution Vulnerability(CVE-2024-54887)

A security researcher, exploring reverse engineering and exploit development, has successfully identified a critical...

Brave Browser Vulnerability Allows Malicious Website Appears as Trusted One

A security vulnerability has been identified in Brave Browser, potentially allowing malicious websites to...

Beware! Fake SBI Reward APK Attacking Users to Deliver Android Malware

A recent phishing campaign has targeted customers of SBI Bank through a deceptive message...